Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
CISA Advises Customers of Progress Software to MOVEit
Facebook   X   LinkedIn   Email

CISA Advises Customers of Progress Software to MOVEit

June 8, 2023

Progress Software's MOVEit Transfer, a managed file transfer application, has been extensively exploited due to a critical vulnerability, according to Huntress and Rapid7. The vulnerability, identified as CVE-2023-34362, is a severe SQL injection flaw that can result in escalated privileges and unauthorized access to systems.

According to reports, approximately 2,500 instances of MOVEit Transfer were exposed to the public internet as of May 31, 2023, with a majority of them located in the United States. Exploiting this vulnerability allows attackers to deploy a web shell named "human2.aspx" in the "wwwroot" directory, enabling them to exfiltrate various data stored by the local MOVEit service. The attack chain also involves creating new admin user account sessions named "Health Check Service" to evade detection.

As a result, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert, urging users and organizations to take mitigation steps to protect against malicious activities. Recommendations include isolating servers by blocking inbound and outbound traffic, inspecting environments for possible indicators of compromise (IoCs), and deleting them before applying fixes.

Threat actors targeting enterprise file transfer systems have been focusing on various industries across countries such as Canada, India, the United States, Italy, Pakistan, and Germany. These attacks have proven to be lucrative for stealing critical data from multiple victims simultaneously. While the exact motives behind these attacks are unclear, they could potentially involve extortion. Consequently, victim organizations should anticipate the possibility of receiving extortion email messages in the near future.

Dealing with cyber extortion threats can be a stressful and challenging situation. Here are some tips to help handle such threats:

  1. Stay calm and assess the situation: It's important to remain composed and evaluate the credibility and severity of the threat before taking any action. Sometimes, cyber extortion threats may turn out to be empty claims.
  2. Preserve evidence: Keep records of any communication or evidence related to the extortion attempt. This can be useful for law enforcement agencies and cybersecurity experts in investigating the incident.
  3. Do not engage or negotiate with the attackers: Avoid responding to the threat or engaging in any form of negotiation with the extortionist. Responding can encourage further extortion attempts and may not guarantee a resolution.
  4. Contact law enforcement: Report the incident to your local law enforcement agency or cybercrime unit. Provide them with all available evidence and details about the extortion attempt.
  5. Inform your organization or superiors: If the extortion attempt targets your workplace or involves company data, inform your organization's IT department or management about the incident. They can take appropriate steps to safeguard the organization's interests.
  6. Strengthen security measures: Review and enhance your cybersecurity practices. This may include implementing stronger access controls, regularly updating software and systems, educating employees about phishing and social engineering threats, and using robust encryption and backup mechanisms.

Remember, prevention is key. By adopting proactive cybersecurity measures and educating yourself and your organization about potential threats, you can reduce the risk of falling victim to cyber extortion attempts.

 


Email Scams Threaten Extortion And Blackmail

Scams & Phishing

Email Scams Threaten Extortion And Blackmail

An uptick in email scams has cybersecurity professionals concerned, and for good reason. Symantec researchers found that in the first five months of 2019, they prevented almost 300 million extortion email attacks from going forward. Just some of those discovered include blackmail, sextortion, bombs, hit men, and malware threats. The researchers also determined the average cost of paying demands over a 30 day period was $1.2 million in 243 Bitcoin transactions. READ FULL STORY

Is Cybersecurity Insurance For Me? What To Know

Your Security

Is Cybersecurity Insurance For Me? What To Know

The pandemic provided a catalyst for cyberattacks to spike in ways that had yet to be seen. According to a report by the Identity Theft Resource Center, when compared to the last quarter of 2020, the number of cybercrime victims is up 564% so far this year. For the right person or business, cybersecurity insurance can make a lot of sense. Help with recovering from a cyberattack is something everyone can use, especially with the chaos and financial losses that can follow. READ FULL STORY

Firewall vs. Antivirus: What’s the Difference?

Mobile Security

Firewall vs. Antivirus: What’s the Difference?

In today's interconnected world, cybersecurity is more important than ever. Businesses of all sizes face the threat of cyberattacks, and the stakes are high. A successful attack can result in the loss of sensitive data, financial damage, and reputational damage. Fortunately, there are a variety of cybersecurity solutions available to help businesses protect themselves. By investing in these products and services, businesses can defend themselves against a wide range of threats, such as viruses, malware, and SQL injections. READ FULL STORY

FBI Ranks “Most Hacked” States In The US. Does Your State Rate?

General News

FBI Ranks “Most Hacked” States In The US. Does Your State Rate?

First of all, no need to panic. No one expects you to pack your bags and move to a state with a lower cybercrime ranking. Every year, the FBI’s Internet Crime Complaint Center (IC3) releases its national cybercrime rankings by state. The data comes from only those cybercrimes reported to the IC3. With their “2022 Internet Crime Report” release, buckle up, read on, and find out if (and where) your state rates. In a contest no one wants to win, there is still a clear leader. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...